|Publication number||US20050074122 A1|
|Application number||US 10/964,755|
|Publication date||Apr 7, 2005|
|Filing date||Oct 15, 2004|
|Priority date||Oct 7, 2003|
|Also published as||US7325133, US8515078, US20080152140, US20110004759|
|Publication number||10964755, 964755, US 2005/0074122 A1, US 2005/074122 A1, US 20050074122 A1, US 20050074122A1, US 2005074122 A1, US 2005074122A1, US-A1-20050074122, US-A1-2005074122, US2005/0074122A1, US2005/074122A1, US20050074122 A1, US20050074122A1, US2005074122 A1, US2005074122A1|
|Original Assignee||Koolspan, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (9), Referenced by (41), Classifications (9), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This instant application claims priority to U.S. Provisional Application No. 60/511,096 filed on Oct. 15, 2003, the disclosure of which is incorporated herein by reference in its entirety, and is a continuation-in-part application of U.S. patent application Ser. No. 10/679,371, entitled “Localized Network Authentication and Security Using Tamper-Resistant Keys,” filed Oct. 7, 2003, the disclosure of which is incorporated herein by reference in its entirety. The instant application is also related to copending U.S. patent application Ser. No. 10/679,268, entitled “Shared Network Access Using Different Access Keys,” filed Oct. 7, 2003, and copending U.S. patent application Ser. No. 10/679,472, entitled “Self-Managed Network Access Using Localized Access Management,” filed Oct. 7, 2003, the disclosures of which are both incorporated by reference in their entirety.
1. Field of the Invention
The present invention relates to wireless networking, and more particularly, to a mass subscriber management technique for wireless networks.
2. Description of Related Art
Network subscriber management typically involves a centralized database wherein a list of authorized subscribers (i.e., authorized users) and data pertaining thereto are maintained. When a subscriber attempts to gain access to the services and resources of a private network, the subscriber must first be authenticated by the authentication system in use on the network.
Typically, subscribers are identified by an account name and password. For example, Remote Access Dial-In User Service (RADIUS) is an authentication and accounting system used by many Internet Service Providers (ISPs) that employs account names and passwords. When a subscriber attempts to log into the ISP via RADIUS, their account name (i.e., username) and password must be entered via a login screen. This information is passed to a remote RADIUS server, which checks that the information is correct, and then authorizes access to the ISP network system. If the account name and password are not entered properly, access to the ISP network system is denied.
This type of technology, while standard in the industry, has several problems. First, as it is a centralized method, all database information typically exists in one place at a remote server site and must be backed up for reliability. Second, valuable network bandwidth is occupied during the authentication process. Third, it imposes delays to the subscriber, as the subscriber must wait to be authenticated by the remote server. Fourth, real-time access to the remote authentication server must be provided, requiring the server and network to be both highly available and reliable. These are all critical issues for ISPs that provide wireless connectivity in public areas, also known as “Hot Spots,” via the use of an edge device such as access point.
De-centralizing the subscriber database by pushing the subscriber information out from the center to the edge of the wired network, i.e., at the Hot Spot, is problematic because of two concerns. First, a wireless network service provider can implement a number of edge devices. Each edge device must be provided and updated with the same database of subscriber account names and passwords, thereby requiring a heavy burden to synchronize all of the edge devices' subscriber databases. Such synchronization further wastes value network bandwidth that could be dedicated to in-band communications. Second, as the subscriber database reaches a critical point, the available memory and processing resources within the edge device is typically insufficient to store and process the database.
The present invention overcomes these and other deficiencies of the prior art by providing an edge-based subscriber authentication and management technique that does not require real-time access to a centralized database.
In an embodiment of the invention, a method for authenticating a communications device attempting to access a network comprises the steps of: receiving an identifier associated with a communications device; calculating a number based on a computation of the identifier; selecting a cryptographic key specified by the number from a key table; and performing an authentication technique that employs the cryptographic key to determine whether the communications device is permitted to access a network. The identifier can be a serial number of a token.
In another embodiment of the invention, a network device comprises: a transceiver, a hardware chip coupled to the transceiver, wherein the hardware chip processes an identifier received from a remote communications device via the transceiver; calculates a number based on a computation of the identifier; selects a cryptographic key specified by the number from a key table; and performs an authentication technique that employs the cryptographic key to determine a level of authentication for the remote communications device. The transceiver can be a wireless transceiver and the hardware chip can be coupled to the transceiver via a universal serial bus.
In another embodiment of the invention, a method of identifying a cryptographic key of a remote communications device comprises the steps of: receiving a serial number uniquely associated with a remote communications device; calculating an integer X equal to a remainder after dividing the serial number by a modulus N; and identifying an Xth cryptographic key from a key table. The serial number can be a serial number of a token associated with the remote communications device.
In yet another embodiment of the invention, a method of securing data comprises the steps of: retrieving a unique serial number and a cryptographic key; computing an initialization vector based upon the unique serial number and the selected cryptographic key; and encrypting data using the computed initialization vector and the cryptographic key. The step of computing an initialization vector can comprise discarding a ciphertext output of an encryption of the unique serial number.
In yet another embodiment of the invention, a method of establishing a unique shared session key between two or more parties comprises the steps of: receiving a serial number transmitted from another party, retrieving a first secret key of the another party from a key table common to all parties, retrieving a locally stored second secret key, and deriving a shared session key from the first and second secret keys. The first serial number can comprise a serial number associated with a physical token, which is coupled to a communications device of the another party.
In yet another embodiment of the invention, a network device comprises: a transceiver, a hardware chip coupled to the transceiver, wherein the hardware chip processes a serial number received from a remote communications device via the transceiver, retrieves a first secret key associated with the serial number from a key table, retrieves a locally stored second secret key, and derives a shared session key from the first and second secret keys. The transceiver can be a wireless transceiver. The hardware chip can be coupled to the transceiver via a universal serial bus.
An advantage of the invention is that very large numbers of subscribers can be authenticated using minimal network resources and without requiring a remote authentication server. Another advantage of the invention is that an unlimited number of token-equipped subscribers can be authenticated and successfully managed by local network edge devices. Yet another advantage of the invention is that a unique encryption session key can be generated for each subscriber after authentication takes place.
Another advantage of the invention is that remote subscriber secret keys can be obtained using a key table comprising a set of randomly selected keys where the keys have no mathematical relationship to the serial number of the smart card. Another advantage of the invention is that a remote subscriber secret key can be obtained with no limits of scale and requiring no further communications or additional network server support.
Yet another advantage of the present invention is that it provides a technique to compute a shared session key between two or more parties where the parties have no previous knowledge or each other and do not exchange keys or any secret information. Yet another advantage of the invention is that the computed shared session key is the result of a mathematical process performed independently by each party.
The foregoing, and other features and advantages of the invention, will be apparent from the following, more particular description of the preferred embodiments of the invention, the accompanying drawings, and the claims.
For a more complete understanding of the present invention, the objects and advantages thereof, reference is now made to the following descriptions taken in connection with the accompanying drawings in which:
Preferred embodiments of the present invention and their advantages may be understood by referring to
Each subscriber is provided with a physical token (125) (“subscriber token”) comprising an integrated circuit (128) (or “smart card”) or an appropriate cryptographically equipped hardware chip. The subscriber token (125) is preferably configured such that it can be connected to the computing device (120) via a Universal Serial Bus (USB) interface. In alternative embodiments, the subscriber token can take the form of an expansion card, PC card, Personal Computer Memory Card International Association (PCMCIA) cards, serial port hardware, parallel port hardware, or any other hardware configuration that can be coupled to the computing device (120). The subscriber token (125) includes a pre-stored set of cryptographic keys that is never exposed to the subscriber or to any network administrator. These pre-stored keys are used to encrypt data that is transferred from the subscriber's computing device (120) to the network edge device (140) preferably in accordance with one or more techniques described in commonly owned and copending U.S. patent application Ser. Nos. 10/679,268, 10/679,371, and 10/679,472, the disclosures of which are incorporated herein by reference in their entirety. Nonetheless, one of ordinary skill in the art recognizes that other secure communications techniques can be implemented in alternative embodiments of the present invention. The smart card (128) can be selected from those available from a wide-variety of manufacturers and preferably is designed and manufactured according to standard International Standards Organization (ISO) specifications, e.g., ISO Specification 7816.
The pre-stored set of cryptographically include a Network Send Key (NKS, 220), a Network Receive Key (NKR, 230), and a Subscriber Secret Key (NKUIDS, 240). The Network Send Key (220) is used to encrypt communications to the network edge device (140). The Network Receive Key (230) is used to decrypt communications received from the network edge device (140). The Network Send Key (220) and the Network Receive Key (230) are common to all subscribers of the wireless network service provider system (100). The Subscriber Secret Key (240), however, is generally assigned uniquely to each subscriber. A more detailed explanation of the generation of the above-identified keys is provided in commonly owned U.S. patent application Ser. Nos. 10/679,268, 10/679,371, and 10/679,472.
In the present invention, the same Subscriber Secret Key (240) is provided to more than one subscriber. This feature is particularly advantageous in a wireless network service provider system having a large number of subscribers or possible subscribers. For example, in a system implementing a 256-bit Subscriber Secret Key (240), there are 2256 (˜1.158×1077) possible unique keys in the overall key pool. The storage and/or processing of such a large pool, or even a portion thereof, typically exceeds the storage and/or processing capabilities of the edge device (140), particularly in legacy access points. Accordingly, there is a need to limit the number of cryptographic keys to be stored and processed at the edge device (140) while still maintaining a relatively large bit-length (i.e., secure) Subscriber Secret Key (240).
According to an embodiment of the invention, the subscriber is associated with a specific Subscriber Secret Key (240) from the key table (310) as determined by a mathematical operation performed on the subscriber's integrated circuit serial number (210). In an exemplary embodiment, the mathematical operation is a 10-bit modulus operation and is performed on the serial number (210) to identify a particular Subscriber Secret Key (240) from the key table (310). Referring to
In at least one of the secure communications and authentication techniques described in commonly owned U.S. patent application Ser. Nos. 10/679,268, 10/679,371, and/or 10/679,472, a first random number (R1) is generated and encrypted using the Subscriber Secret Key (240) for inclusion in the Key Data (715). This invention, however, recognizes that more than one user may in fact have the same Subscriber Secret Key (240) as noted above, which can be potentially associated with the same network edge device (140) at the same time. The following describes a technique to circumvent this problem.
The DES BLOCK function (840) has as its output two products: a new IV and ciphertext. The IV stays in memory, but the ciphertext output, “Key Data,” (715) is implemented in the further processing of the first authentication data packet (634). The important step here is that since the ciphertext output from operation of the DES BLOCK INIT function (810) is discarded, the receiving side of the authentication (i.e., the edge device (140)) would be unable to successfully decrypt the random number (830) using the same 3DES algorithm without first pre-setting its own IV. The receiving side has to first perform a DES BLOCK INIT function on the Subscriber Serial Number (210) and discard the ciphertext before trying to decrypt the Key Data (715).
The result of the two encryption steps, i.e., DES BLOCK INIT function (810) and DES BLOCK function (840), is a Key Data (715) ciphertext of the random number (830) using an IV that was the result of an encryption process on the subscriber's serial number (210). This Key Data (715) ciphertext is the result of encrypting the two data elements, i.e., IV (820) and random number (830), with the Subscriber Secret Key (240). As the serial number (210) is unique, the resulting Key Data (715) could not come from any other source, but the corresponding subscriber token (125).
In alternative embodiments of the invention, the Network Send Key (920) and the Network Receive Key (930) can be omitted, based upon on a symmetric encryption algorithm, or a public-key encryption algorithm.
This preferred embodiments described herein result in the generation of a unique encryption key based on an algorithm wherein the key is derived from a table-lookup using the last several digits of the Smart Card serial number as an index into the table of stored secret keys. Another use of the improvements described herein is to enable peer-to-peer encryption between two unrelated parties, i.e., two parties who have no particular knowledge of each other's key. For example, the present invention is application to Voice over Internet Protocol (VoIP), a protocol that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using Internet Protocol (IP) rather than by traditional circuit transmissions of the Public Switched Telephone Network (PSTN).
The unique electronic serial number associated with each party is used as previously discussed to effect a “pointer” into a table of randomly chosen Session Keys. For example,
Other embodiments and uses of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Although the invention has been particularly shown and described with reference to several preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6026165 *||Jun 20, 1996||Feb 15, 2000||Pittway Corporation||Secure communications in a wireless system|
|US6397328 *||Nov 21, 1996||May 28, 2002||Pitney Bowes Inc.||Method for verifying the expected postage security device and an authorized host system|
|US6591364 *||Aug 28, 1998||Jul 8, 2003||Lucent Technologies Inc.||Method for establishing session key agreement|
|US6625591 *||Sep 29, 2000||Sep 23, 2003||Emc Corporation||Very efficient in-memory representation of large file system directories|
|US7024690 *||Apr 28, 2000||Apr 4, 2006||3Com Corporation||Protected mutual authentication over an unsecured wireless communication channel|
|US7028186 *||Feb 11, 2000||Apr 11, 2006||Nokia, Inc.||Key management methods for wireless LANs|
|US20020090089 *||Jan 5, 2001||Jul 11, 2002||Steven Branigan||Methods and apparatus for secure wireless networking|
|US20030235305 *||Jun 20, 2002||Dec 25, 2003||Hsu Raymond T.||Key generation in a communication system|
|US20040264699 *||Jun 24, 2003||Dec 30, 2004||Meandzija Branislav N.||Terminal authentication in a wireless network|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7336654 *||Oct 25, 2004||Feb 26, 2008||I2Telecom International, Inc.||Portable VoIP service access module|
|US7451921 *||Sep 1, 2004||Nov 18, 2008||Eric Morgan Dowling||Methods, smart cards, and systems for providing portable computer, VoIP, and application services|
|US7460480||Mar 11, 2005||Dec 2, 2008||I2Telecom International, Inc.||Dynamically adapting the transmission rate of packets in real-time VoIP communications to the available bandwidth|
|US7565529 *||Mar 3, 2005||Jul 21, 2009||Directpointe, Inc.||Secure authentication and network management system for wireless LAN applications|
|US7606217||Jul 22, 2003||Oct 20, 2009||I2 Telecom International, Inc.||System and method for routing telephone calls over a voice and data network|
|US7782878||Aug 11, 2005||Aug 24, 2010||I2Telecom Ip Holdings, Inc.||System and method for sharing an IP address|
|US7912788 *||Sep 29, 2004||Mar 22, 2011||Pitney Bowes Inc.||Mutual authentication system and method for protection of postal security devices and infrastructure|
|US7924825||Nov 5, 2008||Apr 12, 2011||Eric Morgan Dowling||System for providing portable VoIP services|
|US7957401||Jul 3, 2003||Jun 7, 2011||Geos Communications, Inc.||System and method for using multiple communication protocols in memory limited processors|
|US8335232||Oct 31, 2008||Dec 18, 2012||Geos Communications IP Holdings, Inc., a wholly owned subsidiary of Augme Technologies, Inc.||Method and system of renegotiating end-to-end voice over internet protocol CODECs|
|US8347076 *||Dec 1, 2004||Jan 1, 2013||Samsung Electronics Co., Ltd.||System and method for building home domain using smart card which contains information of home network member device|
|US8356175 *||Jun 29, 2005||Jan 15, 2013||Intel Corporation||Methods and apparatus to perform associated security protocol extensions|
|US8364978 *||Nov 26, 2008||Jan 29, 2013||Koolspan, Inc.||System for and method of auto-registration with cryptographic modules|
|US8379634||Sep 2, 2009||Feb 19, 2013||Augme Technologies, Inc.||System and methods to route calls over a voice and data network|
|US8477767||Mar 8, 2011||Jul 2, 2013||Eric Morgan Dowling||Methods, smart cards, and systems for providing portable computer, VoIP, and application services|
|US8625584||Mar 8, 2011||Jan 7, 2014||Eric Morgan Dowling||Methods, smart cards, and systems for providing portable computer, VoIP, and application services|
|US8751819 *||Sep 22, 2011||Jun 10, 2014||Symantec Corporation||Systems and methods for encoding data|
|US8792479||Nov 27, 2012||Jul 29, 2014||Hipcricket, Inc.||System and methods to route calls over a voice and data network|
|US8804758||Feb 6, 2013||Aug 12, 2014||Hipcricket, Inc.||System and method of media over an internet protocol communication|
|US8842568||Nov 26, 2012||Sep 23, 2014||Hipcricket, Inc.||Method and system of renegotiating end-to-end voice over internet protocol CODECs|
|US8842836||Nov 26, 2008||Sep 23, 2014||Koolspan, Inc.||System for and method of cryptographic provisioning|
|US8973122||Apr 20, 2012||Mar 3, 2015||Directpointe, Inc.||Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method|
|US9008312||Dec 17, 2012||Apr 14, 2015||Koolspan, Inc.||System and method of creating and sending broadcast and multicast data|
|US9094213 *||Oct 24, 2008||Jul 28, 2015||Securekey Technologies Inc.||Method and system for effecting secure communication over a network|
|US20050002506 *||Jul 22, 2003||Jan 6, 2005||Doug Bender||System and method for routing telephone calls over a voice and data network|
|US20050038195 *||Sep 1, 2004||Feb 17, 2005||Parikh Deepak R.||Ethylene interpolymer polymerizations|
|US20050120216 *||Dec 1, 2004||Jun 2, 2005||Samsung Electronics Co., Ltd.||System and method for building home domain using smart card which contains information of home network member device|
|US20060034296 *||Aug 11, 2005||Feb 16, 2006||I2 Telecom International, Inc.||System and method for sharing an IP address|
|US20060069655 *||Sep 29, 2004||Mar 30, 2006||Pitney Bowes Incorporated||Mutual authentication system and method for protection of postal security devices and infrastructure|
|US20060072527 *||Mar 3, 2005||Apr 6, 2006||Sweet Spot Solutions, Inc.||Secure authentication and network management system for wireless LAN applications|
|US20060088025 *||Oct 25, 2004||Apr 27, 2006||Robb Barkley||Portable VoIP service access module|
|US20060271690 *||May 11, 2006||Nov 30, 2006||Jaz Banga||Developing customer relationships with a network access point|
|US20090172412 *||Nov 26, 2008||Jul 2, 2009||Koolspan, Inc.||System for and method of auto-registration with cryptographic modules|
|US20100318801 *||Oct 24, 2008||Dec 16, 2010||Securekey Technologies Inc.||Method and system for protecting real estate from fradulent title changes|
|US20140161258 *||Dec 6, 2013||Jun 12, 2014||Lg Uplus Corp.||Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal|
|USRE43607||Aug 28, 2012||Jones Farm Technology, Llc||Method and apparatus for evaluating a known good die using both wire bond and flip-chip interconnects|
|DE102005030305A1 *||Jun 23, 2005||Jan 4, 2007||Deutsche Telekom Ag||Service e.g. online banking, authentification method for computer, involves reading digital identification data, verifying if permissible link of identification data exists with identification, and supplying data if link exists|
|EP1722503A1 *||May 13, 2005||Nov 15, 2006||DrayTek Corp.||Method used by an access point of a wireless LAN and related apparatus|
|EP2163028A1 *||Jun 21, 2007||Mar 17, 2010||Koolspan, Inc.||System and method of creating and sending broadcast and multicast data|
|EP2163028A4 *||Jun 21, 2007||Sep 17, 2014||Koolspan Inc||System and method of creating and sending broadcast and multicast data|
|WO2009064279A1||Dec 28, 2007||May 22, 2009||Koolspan Inc||Secure mobile telephony|
|Cooperative Classification||H04L9/0838, H04L2209/80, H04L63/123, H04L63/083, H04L9/3234|
|European Classification||H04L63/08D, H04L9/08|
|Sep 12, 2006||AS||Assignment|
Owner name: KOOLSPAN, INC.,MARYLAND
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FASCENDA, ANTHONY C.;REEL/FRAME:018236/0305
Effective date: 20060912
|Jul 29, 2011||FPAY||Fee payment|
Year of fee payment: 4
|Sep 24, 2013||AS||Assignment|
Owner name: SILICON VALLEY BANK, MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:KOOLSPAN, INC.;REEL/FRAME:031282/0689
Effective date: 20130924
|Jul 29, 2015||FPAY||Fee payment|
Year of fee payment: 8